共 50 条
- [11] How to Use Pseudorandom Generators in Unconditional Security Settings PROVABLE SECURITY, PROVSEC 2014, 2014, 8782 : 291 - 299
- [13] On the Security of Modular Exponentiation with Application to the Construction of Pseudorandom Generators Journal of Cryptology, 2003, 16 : 71 - 93
- [14] Pseudorandom numbers and hash functions from iterations of multivariate polynomials Cryptography and Communications, 2010, 2 : 49 - 67
- [15] Pseudorandom numbers and hash functions from iterations of multivariate polynomials CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2010, 2 (01): : 49 - 67
- [18] Hash Functions Based on Three Permutations: A Generic Security Analysis ADVANCES IN CRYPTOLOGY - CRYPTO 2012, 2012, 7417 : 330 - 347
- [19] Pseudorandom Generators based on one-way functions Applied Decisions in Area of Mechanical Engineering and Industrial Manufacturing, 2014, 577 : 820 - 823
- [20] Security Analysis of Even-Mansour Structure Hash Functions INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2021), PT II, 2021, 12919 : 163 - 173